Skip to content

SNMP Polling for Network Device Inventory - Automated Property Collection

SNMP Polling for Network Device Inventory - Automated Property Collection

Section titled “SNMP Polling for Network Device Inventory - Automated Property Collection”

SNMP Polling transforms rConfig from a configuration backup tool into an intelligent data collection platform. By leveraging the Simple Network Management Protocol, rConfig can automatically extract device properties—serial numbers, software versions, interface details, uptime statistics—without parsing configuration files or running custom scripts.

SNMP Polling: Automated Device Property Collection

Section titled “SNMP Polling: Automated Device Property Collection”

SNMP Polling queries network devices using standardized Object Identifiers (OIDs) to retrieve specific data points. Every time rConfig backs up a device configuration, it simultaneously polls any configured SNMP OIDs and stores the results as dynamic device properties.

The result: You get configuration backups and rich device metadata in a single operation.

SNMP Polling in rConfig uses three components:

  1. SNMP Connection Profiles - Store SNMP credentials (community strings for v2c, or auth/priv credentials for v3)
  2. SNMP OID Definitions - Specify which data points to collect (e.g., sysDescr, ifName, serial numbers)
  3. SNMP Polling Groups - Link devices, OIDs, and connection profiles together
  1. Device backup triggered (manual, scheduled, or CLI)
  2. rConfig checks if the device belongs to an SNMP Polling Group
  3. If yes, SNMP poll executes alongside the configuration download
  4. Each OID in the group is queried using the associated connection profile
  5. Results stored as device properties in the database
  6. Properties displayed in device details and inventory reports

Key insight: SNMP polling happens automatically during backups. You don’t run separate polling operations—it’s integrated into your existing workflow.

  • Latest values only are displayed in the UI and reports
  • Historical values can be tracked through activity logs
  • All polling events are logged for troubleshooting

Hardware Inventory: Extract serial numbers, chassis IDs, and model information from hundreds of devices without manual data entry.

Software Auditing: Track IOS/NX-OS/JunOS versions across your infrastructure to identify devices needing upgrades.

Interface Discovery: Inventory interface names, descriptions, and MAC addresses without parsing show commands.

Compliance Validation: Verify system contact, location, and other SNMP system fields match organizational standards.

Capacity Planning: Collect uptime, CPU/memory stats, or other operational metrics alongside configuration data.

  • Standardized data: When the information you need is available via standard SNMP MIBs
  • Large scale: Polling 500 devices for serial numbers is faster and more reliable than parsing configs
  • Non-config data: Hardware details, environmental sensors, operational stats that don’t appear in configurations
  • Consistent format: SNMP returns structured data, eliminating regex complexity
  • Extract more specific data with Regex: If you need to extract a specific part of an SNMP response, you can apply regex patterns to the polled data. This allows for more granular control over the information you collect.
  • SNMP disabled: Many security-focused environments disable SNMP entirely
  • Configuration-specific data: VLANs, routing protocols, ACL counts—things that live in configs, not MIBs
  • Vendor-specific details: Custom config sections without corresponding SNMP OIDs
  • Already backing up: If configs already contain the data, parsing might be simpler
  • No SNMP support: Some legacy or specialized devices may not support SNMP at all
  • Vendor Bugs: Some devices have buggy SNMP implementations that return incorrect data

You can use both methods simultaneously—SNMP for standardized hardware/software details, config parsing for configuration-specific properties.

SNMP Versions: Choosing the Right Protocol

Section titled “SNMP Versions: Choosing the Right Protocol”
  • Security: Plaintext community strings (read-only or read-write)
  • Use case: Internal networks, lab environments, legacy devices
  • Pros: Simple, widely supported, minimal overhead
  • Cons: No encryption, credentials sent in clear text
  • Security: Authentication (MD5/SHA) and encryption (DES/AES)
  • Use case: Production environments, compliance requirements, internet-facing devices
  • Pros: Encrypted, authenticated, granular access control
  • Cons: More complex setup, some older devices lack support

Recommendation: Use SNMPv3 whenever possible. If you must use v2c, restrict it to trusted management VLANs.

Polling Groups: Organizing Your Data Collection

Section titled “Polling Groups: Organizing Your Data Collection”

Polling Groups let you organize SNMP polling by device type, location, or data requirements.

Example structure:

  • Cisco Routers - Poll for Cisco-specific OIDs (IOS version, serial numbers)
  • HP/Aruba Switches - Poll for ProCurve/ArubaOS-specific data
  • Core Infrastructure - Poll all critical devices for uptime and system info
  • Branch Offices - Poll only essential OIDs to reduce overhead

Each device can belong to one polling group. Choose OIDs that make sense for that device category.

Common OID categories:

System Information

  • sysDescr (device description)
  • sysUpTime (device uptime)
  • sysContact (contact information)
  • sysLocation (physical location)
  • sysName (hostname)

Hardware Details

  • Serial numbers
  • Model numbers
  • Chassis IDs
  • Module inventory

Software/Firmware

  • OS version
  • Firmware revision
  • Software features enabled

Interface Data

  • Interface names and descriptions
  • MAC addresses
  • Administrative and operational status
  • Speed and duplex settings

Vendor-Specific

  • Cisco: IOS version, platform details
  • Juniper: JunOS version, routing engine info
  • Aruba: Controller role, AP counts
  • Dell: PowerConnect firmware

SNMP polling adds minimal time to backup operations:

  • Each OID query: 10-50ms (LAN)
  • 10 OIDs per device: 100-500ms additional time
  • For most deployments, this is negligible

SNMP polling scales linearly with device count:

  • 100 devices, 10 OIDs each = ~1000 SNMP queries
  • Even at 100ms per query, that’s ~2 minutes total
  • Queries run in parallel during backup jobs

SNMP traffic is minimal:

  • Average query/response: < 1KB
  • 1000 queries = ~1MB of traffic
  • Negligible compared to configuration file transfers

SNMP-polled properties become dynamic device attributes in Device Inventory. This means:

  • Inventory reports include SNMP data alongside configuration-parsed properties
  • Properties are searchable (in future V8+ releases)
  • Historical tracking via activity logs
  • Export to external systems via API or CSV

The combination of SNMP polling and configuration parsing gives you comprehensive device intelligence without manual data entry.

AspectSNMP PollingConfig Parsing
Data SourceLive device queryBacked-up config file
Setup ComplexityModerate (OIDs, credentials)Moderate (regex patterns)
Data TypesHardware, software, runtime statsConfiguration-specific details
AccuracyReal-time, current valuesReflects last backup
SNMP RequiredYesNo
Parsing SkillsNoneRegex knowledge helpful
Vendor VariabilityStandardized MIBsConfig syntax varies widely
  1. Use SNMPv3 whenever possible
  2. Restrict SNMP to management VLANs - Don’t expose SNMP to untrusted networks
  3. Use read-only community strings - rConfig only needs read access
  4. Rotate credentials regularly - Update community strings/SNMPv3 credentials periodically
  5. Monitor SNMP logs - Watch for failed authentication attempts
  6. Disable SNMP on devices that don’t need it - Reduce attack surface

SNMP Polling automates the collection of device properties that would otherwise require manual inventory work or complex configuration parsing. It’s most valuable when:

  • You need standardized hardware/software details at scale
  • SNMP is already enabled and secured on your devices
  • You want operational data (uptime, versions) alongside configurations
  • You’re building comprehensive device inventory for reporting or integration

Combined with configuration parsing, SNMP Polling gives you a complete picture of your network infrastructure—captured automatically with every backup.